[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] more additions to the website
Update of /home2/or/cvsroot/website
In directory moria.mit.edu:/home2/arma/work/onion/cvs/website
Modified Files:
contribute.html index.html research.html
Log Message:
more additions to the website
Index: contribute.html
===================================================================
RCS file: /home2/or/cvsroot/website/contribute.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -d -r1.28 -r1.29
--- contribute.html 1 Feb 2005 03:46:57 -0000 1.28
+++ contribute.html 26 Feb 2005 08:29:56 -0000 1.29
@@ -54,6 +54,8 @@
server</a> to help with development and scalability.</li>
<li>Does somebody want to help maintain this website, or help with
documentation, or help with managing our TODO and handling bug reports?</li>
+<li>It would be nice to translate the documentation and other web pages
+into other languages. (E.g. <a href="http://tor.freesuperhost.com/">Persian</a>)</li>
<li>Please fix up <a
href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ">the FAQ Wiki</a>,
and if you know the answer to a question in the "unanswered FAQs" list,
Index: index.html
===================================================================
RCS file: /home2/or/cvsroot/website/index.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -d -r1.49 -r1.50
--- index.html 23 Feb 2005 23:31:23 -0000 1.49
+++ index.html 26 Feb 2005 08:29:56 -0000 1.50
@@ -109,8 +109,13 @@
href="cvs/tor/doc/tor-doc.html#installing">installing it</a> and then
<a href="cvs/tor/doc/tor-doc.html#server">helping out</a>. You can also
<a href="documentation.html">learn more about Tor here</a>.
-We also welcome research into the security of Tor and related anonymity
-systems, and want to hear about any vulnerabilities you find.
+</p>
+
+<p>
+Part of the goal of the Tor project is to deploy a public testbed for
+experimenting with design trade-offs, to teach us how best to provide
+privacy online. We welcome research into the security of Tor and related
+anonymity systems, and want to hear about any vulnerabilities you find.
</p>
<p>
Index: research.html
===================================================================
RCS file: /home2/or/cvsroot/website/research.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -d -r1.12 -r1.13
--- research.html 4 Jan 2005 22:45:44 -0000 1.12
+++ research.html 26 Feb 2005 08:29:56 -0000 1.13
@@ -47,7 +47,24 @@
papers</a> (especially the ones in boxes) to get up to speed on anonymous
communication systems.</p>
-<p>More here coming soon.</p>
+<p>We need people to attack the system, quantify defenses, etc. For example:
+</p>
+<ul>
+<li>Website volume fingerprinting attacks (<a
+href="http://freehaven.net/anonbib/#back01">Back et al</a>, <a
+href="http://freehaven.net/anonbib/#hintz02">Hintz</a>).
+Defenses include a large cell size, <a
+href="http://freehaven.net/anonbib/#timing-fc2004">defensive dropping</a>,
+etc. How well does each approach work?</li>
+<li>The end-to-end traffic confirmation attack. We need to study
+long-range dummies more, along with traffic shaping. How much traffic
+of what sort of distribution is needed before the adversary is confident
+he has won?</li>
+<li>It's not that hard to DoS Tor servers or dirservers. Are puzzles
+the right answer? What other practical approaches are there?</li>
+<li>What sensitive info squeaks by privoxy? Are other html scrubbers
+better?</li>
+</ul>
</div><!-- #main -->
</div>